At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,946,924 |
System and method for automating information abstraction process for
documents A computer-implemented method, a processing pipeline and a system create a hierarchical semantic map of a document and extracted information. The method... |
US-9,946,923 |
Systems and methods of check detection A digital image of a check may be divided into segments. The segments may be processed to determine the edges between the background data and the check data in... |
US-9,946,922 |
Photonic fence A system for tracking airborne organisms includes an imager, a backlight source (such as a retroreflective surface) in view of the imager, and a processor... |
US-9,946,921 |
Monitoring device, monitoring method and monitoring program A monitoring device includes a crowd behavior analysis unit 21 and an abnormality degree calculation unit 24. The crowd behavior analysis unit 21 specifies a... |
US-9,946,920 |
Sensing element and fingerprint sensor comprising the sensing elements A fingerprint sensor is disclosed. The fingerprint sensor includes a substrate, a sensing electrode, a shielding plate, a first pair of conductive plates and an... |
US-9,946,919 |
Device, system, and method for forensic analysis A portable, handheld device for forensic analysis includes an input unit configured to receive a forensic input at a scene of forensic analysis, and a... |
US-9,946,918 |
Symbol detection for desired image reconstruction In some implementations, a computer-implemented method includes: obtaining a captured image including, (i) a latent fingerprint to be captured, and (ii) a... |
US-9,946,917 |
Efficient determination of biometric attribute for fast rejection of
enrolled templates and other applications A biometric input system includes: a biometric sensor, configured to generate a biometric image comprising features of an input biometric object; and a... |
US-9,946,916 |
Capacitive fingerprint sensor and sensing panel thereof A capacitive fingerprint sensor and a sensing panel are provided. The capacitive fingerprinting sensor includes a sensing circuit, a level switch, an output... |
US-9,946,915 |
Fingerprint sensors with ESD protection A fingerprint sensing device includes a substrate; a plurality of pixels arranged in a grid of rows and columns, each pixel having an active thermal sensing... |
US-9,946,914 |
Liveness detection via ultrasonic ridge-valley tomography An apparatus may include an ultrasonic sensor system and a control system. The control system may be configured for controlling the ultrasonic sensor system to... |
US-9,946,913 |
Electronic device An electronic device is disclosed herein and includes a multi-functional power button and a processor, where the multi-functional power button includes a power... |
US-9,946,912 |
Encoding and decoding data in two-dimensional symbology Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a... |
US-9,946,911 |
Fast retrieval of information embedded in an image A binary bit-string is encoded in a circular image. The circular image encodes substrings of the bit-string in sectors of the circular image and includes... |
US-9,946,910 |
Optical information reading device Provided is an optical information reading device that can reduce an installation load on a user, and can accurately read a code provided to each of various... |
US-9,946,909 |
Arrangement for and method of trapping debris in an electro-optical reader An optical assembly for an electro-optical reader includes a lens mounted in a stepped barrel. The stepped barrel has a barrel step between first and second... |
US-9,946,908 |
Module or arrangement for, and method of, reading a target by image
capture with an imaging reader having... An imaging sensor of an imaging reader senses return light from a target to be read by image capture along an imaging axis over a field of view that extends... |
US-9,946,907 |
Compact imaging module and imaging reader for, and method of, detecting
objects associated with targets to be... Objects associated with targets to be read by image capture are detected without any additional hardware in an imaging module. Return light is captured over a... |
US-9,946,906 |
Vehicle with a soft-touch antenna for communicating sensitive information A vehicle includes two or more soft touch radio frequency (RF) antennas and two or more RF transceivers to communicate sensitive information associated with a... |
US-9,946,905 |
Adaptive processing of radio frequency identification Embodiments of the present disclosure relate to adaptive RFID communication. A tag device includes a storage configured to store content that is executable by a... |
US-9,946,904 |
Apparatus and method for monitoring and communicating data associated with
a product A condition monitoring system includes a radio frequency transponder module including an RFID chip having a first memory, and an antenna; at least one sensor... |
US-9,946,903 |
Authenticity verification system and methods of use A system and associated methods for dynamically authenticating an at least one object are disclosed. In at least one embodiment, upon a user desiring to verify... |
US-9,946,902 |
Method for preventing an unauthorized use of biprocess components This invention provides a system and apparatus that is able to authenticate and prevent illegal manufacturing and unauthorized operation of disposable... |
US-9,946,901 |
Comprehensive RFID and radio communication test system An improved radio RFID tag and reader system comprising a reduced scale and scalable vehicle fitted with one or more electronic toll collection RFID tags and a... |
US-9,946,900 |
Dividing tagged items into subsets A method and system for dividing tagged items into subsets. A region is split into subregions. For each subregion, a central tagged item having more adjacent... |
US-9,946,899 |
Active ASIC intrusion shield Provided are systems, methods, and apparatus for protecting an integrated circuit against invasive attacks and various forms of tampering. A defensive mechanism... |
US-9,946,898 |
Security systems and methods for encoding and decoding digital content Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data... |
US-9,946,897 |
Data privacy management system and method Aspects of the technology described herein can provide data privacy management. An exemplary computing device may have a tracker to track various user data of a... |
US-9,946,896 |
Attribute information provision method and attribute information provision
system A user attribute information provision system processes attribute information of users while preventing a leakage of attribute information. A provision... |
US-9,946,895 |
Data obfuscation Sensitive data can be obfuscated before being provided for processing (i.e., aggregating, sorting, grouping, or transforming) using a pair of keys to generate a... |
US-9,946,894 |
Data processing method and data processing device Provided is a data processing method in a data processing device that is connected to an external storage device and that is equipped with a storage device, the... |
US-9,946,893 |
Method and apparatus for providing privacy profile adaptation based on
physiological state change An approach is provided for adapting privacy profiles to respond to changes in physiological state. The policy platform may process and/or facilitate a... |
US-9,946,892 |
Location based disk drive access Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a... |
US-9,946,891 |
Image-based unlock functionality on a computing device Utilizing an image on a computing device to serve as a template for locking/unlocking the computing device. The image includes a plurality of portions that are... |
US-9,946,890 |
Secure start system for an autonomous vehicle A secure start system for an autonomous vehicle (AV) can detect startup of the AV and transmit credentials to a backend system. When the credentials are... |
US-9,946,889 |
Systems and methods for multi-tenant data protection application A system for providing a multi-tenant data protection application includes a server shared by all tenants for access to the provided multi-tenant data... |
US-9,946,888 |
System for managing multiple subscriptions in a UICC The invention relates to a system for managing multiple subscriptions in a UICC, this system comprising a central server able to manage subscriptions stored on... |
US-9,946,887 |
Method and apparatus for determining privacy policy based on data and
associated values A method includes determining at least one value for at least one instance of data; determining at least one privacy policy, at least one security policy, or a... |
US-9,946,886 |
System and method for authentication with a computer stylus A method for securing operation of a computing device operated with a stylus includes recognizing a pre-defined gesture performed by a stylus on a touch screen,... |
US-9,946,885 |
Process-oriented modeling and flow to restrict access to objects In one embodiment, a method replicates data from a first database system to a second database system and determines a modeling of a first access context for a... |
US-9,946,884 |
System and method for cryptographic suite management Systems and methods for cryptographic suite management are described. A system for cryptographic suite management has a cryptographic suite management unit... |
US-9,946,883 |
Methods and apparatuses for protecting positioning related information Various methods, apparatuses and articles of manufacture are provided which may be implemented to authenticate the provider of a positioning engine provisioned... |
US-9,946,882 |
Method and devices to secure the entry of an alphanumerical code,
corresponding computer program product and... A method and device are provided for securing entry of an alphanumerical code by a user. The method includes: obtaining, through a first device, information for... |
US-9,946,881 |
Global platform health management The use of one or more device health values to indicate the health status of a computing device may enable operating system developers to directly manage the... |
US-9,946,880 |
Software vulnerability analysis method and device The present disclosure includes: searching a code clone corresponding to a used source code from any analysis target source code; detecting a security sink and... |
US-9,946,879 |
Establishing risk profiles for software packages Disclosed are various embodiments for establishing risk profiles for software packages that have an insufficient security history. A security history for a... |
US-9,946,877 |
Technologies for protecting systems and data to prevent cyber-attacks Technologies for protecting systems and data of an organization from malware include a data integrity server configured to receive a data file for import from... |
US-9,946,876 |
Wavelet decomposition of software entropy to identify malware A plurality of data files is received. Thereafter, each file is represented as an entropy time series that reflects an amount of entropy across locations in... |
US-9,946,875 |
Detection of return oriented programming attacks In one embodiment, a processor includes at least one execution unit and Return Oriented Programming (ROP) detection logic. The ROP detection logic may determine... |
US-9,946,874 |
Authenticating application legitimacy Facilities are provided herein to address application phishing by determining whether an application is a legitimate application it purports to be. Optical... |